Vendors play a critical role in supporting key business functions. As a result, companies need to take responsibility for managing their security and risk with the partners they choose, but current methods for managing that risk are inefficient.
A March 2018 study conducted by Forrester Consulting on behalf of...

With the advent of technology in personal healthcare - internet connected glucose monitors, intravenous blood pressure monitoring, personal best friend emotional bots - a lot of highly sensitive data that's rampantly traversing the airwaves. The impact of this data getting in the wrong hands is just starting to be...

Bug bounties are fundamentally changing the way financial service organizations approach the security of the Internet, moving from the realm of novelty towards becoming best practice.
This report presents how the financial services industry is actively looking to bug bounty programs to augment their existing...

Security vendor products are held to a higher standard of security. They must help their customers solve complex security problems, as well as have the most stringent security measures in place throughout the software development lifecycle. To meet those standards, many security vendors are turning to more innovative...

Financial services firms continue to be a favorite target of threat actors, who are launching attacks that are increasingly subtle, complex, and dangerous. Even though financial institutions might maintain tight security over their own operations, lapses on the part of third-party vendors can provide malicious hackers...

Tracking risk across the vendor ecosystem is the best way to stay ahead of cybersecurity threats.
Download this whitepaper and learn how you can transform your vendor risk management with:
Speed;
Scale;
And collaboration.

Information security and risk management teams are frequently asked to update their Board of Directors with the cybersecurity posture of both their company and their vendors. Gartner estimates that by 2020, 75% of Fortune 500 companies will treat vendor risk management as a Board-level initiative to mitigate brand and...

Relationships with vendors are vital for many organizations, but the more data you share, the more risk you acquire. And mitigating this risk requires a degree of visibility into vendor systems that most organizations are hard-pressed to achieve.
Download this guide to explore:
Five of the most impactful...

SANS, NIST and other industry standard methodologies offer thousands of potential questions you could ask your vendor about security. How can you determine which of them are the most important?
Security questionnaires and assessments are integral parts of comprehensive vendor
risk management (VRM) programs. But...

Outsourcing is nothing new. Industries have been embracing service providers for functions they either couldn't or didn't want to perform for years. This necessitated integrating business systems and providing these third party vendors with access to corporate networks and computer systems. The risk was generally...

Looking to streamline your vendor risk management process? Take a look at these tools and techniques.
Organizations today aren't just single entities - they are networks of partners, vendors, and third parties. While interconnected networks are critical for success in most businesses, they also leave data more...

The upcoming enforcement of GDPR puts the spotlight on data governance, but what about the potential impact on vendor risk management? How do you prepare for this new generation of cybersecurity regulations?
Download this eBook that discusses:
Common threads in GDPR, NIST framework and other guidance
Greatest...

As the GDPR enforcement date edges closer, organizations remain unprepared to comply - especially when it comes to vendor risk management. What - beyond contracts - do organizations need?
Download this whitepaper that discusses:
Why organizations remain unprepared for GDPR
What is most misunderstood about vendor...

How well do you know your vendors and the risk they pose? The scope of vendors you need to assess is rising constantly. At the same time, there is more scrutiny than ever on data security and privacy. These factors create greater shared risk where organizations can be held liable for their vendors' actions. To get a...

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.